Cacti Multiple Vulnerabilities Fixed by 0.8.8e


Description   Several vulnerabilities have been identified in Cacti.
- cross-site scripting in settings.php. A remote attacker can exploit it in order to execute arbitrary Javascript or HTML code by enticing their victim into following a specially formed link (CVE-2015-2967)
- SQL injection in graphs.php. A remote attacker can exploit it in order to execute arbitrary SQL commands (CVE-2015-4634)
- SQL injection in graph items and graph template items. A remote attacker can exploit it in order to execute arbitrary SQL commands
- SQL injection in data sources. A remote attacker can exploit it in order to execute arbitrary SQL commands
- SQL injection in cdef.php. A remote attacker can exploit it in order to execute arbitrary SQL commands
- SQL injection in data_templates.php. A remote attacker can exploit it in order to execute arbitrary SQL commands
- SQL injection in graph_templates.php. A remote attacker can exploit it in order to execute arbitrary SQL commands
- SQL injection in host_templates.php. A remote attacker can exploit it in order to execute arbitrary SQL commands
Updated, 13/07/2015:
The cacti packets provided by Debian Squeeze 6, Wheezy 7 and Jessie 8 are vulnerable.
Updated, 20/07/2015:
The cacti packages provided by FreeBSD are vulnerable.
     
Vulnerable Products   Vulnerable OS:
FreeBSD (FreeBSD)GNU/Linux (Debian) - 6, 7, 8openSUSE (SUSE) - 13.1, 13.2Vulnerable Software:
Cacti (The Cacti Group) - 0.5, 0.6, 0.6.1, 0.6.2, 0.6.3, ..., 0.8.8, 0.8.8a, 0.8.8b, 0.8.8c, 0.8.8d
     
Solution   Fixed cacti packages for openSUSE 13.1 and 13.2 are available.
     
CVE   CVE-2015-4634
CVE-2015-2967
     
References   - Cacti : Changelog
http://www.cacti.net/changelog.php
- Debian Security Tracker : CVE-2015-4634
https://security-tracker.debian.org/tracker/CVE-2015-4634
DLA 278-1 : cacti security update
https://lists.debian.org/debian-lts-announce/2015/07/msg00016.html
VuXML : cacti -- Multiple XSS and SQL injection vulnerabilities
http://www.vuxml.org/freebsd/0bfda05f-2e6f-11e5-a4a5-002590263bf5.html
- DSA 3312-1 : cacti security update
http://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00208.html
- openSUSE-SU-2015:1285-1 : Security update for cacti
http://lists.opensuse.org/opensuse-updates/2015-07/msg00052.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
SQL injection Prevention - POST : suspicious SELECT statement in data
3.2.0
SQL injection Prevention - POST : possible version probing in data
3.2.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
3.2.0
SQL injection Prevention - POST : suspicious CREATE statement in data
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
3.2.0
SQL injection Prevention - POST : suspicious UNION statement in data
3.2.0
SQL injection Prevention - POST : suspicious DROP statement in data
3.2.0
SQL injection Prevention - POST : suspicious INSERT statement in data
3.2.0
SQL injection Prevention - POST : suspicious OR statement in data
3.2.0
SQL injection Prevention - POST : suspicious EXEC statement in data
3.2.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
3.2.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
3.2.0
SQL injection Prevention - POST : suspicious HAVING statement in data
3.2.0
SQL injection Prevention - POST : suspicious CAST statement in data
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-07-13 

 Target Type 
Server 

 Possible exploit 
Remote